Changes between Initial Version and Version 1 of CompSec-QSR-2Q2010


Ignore:
Timestamp:
08/20/10 16:40:55 (14 years ago)
Author:
Adam Slagell
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • CompSec-QSR-2Q2010

    v1 v1  
     1[[PageOutline]]
     2
     3= !CompSec Project Status Report =
     4
     5Period: Q1 2010 (Apr 1–Jun 30, 2010)
     6
     7== I. Major accomplishments ==
     8
     9=== A. Milestones achieved ===
     10We reworked the SOW to meet evolving GENI needs
     11
     12We created the following documents
     13  1.    Threat & Vulnerability Report v0.1; 
     14
     15=== B. Deliverables made ===
     16The milestones were specifically the documents we delivered, as listed above.
     17
     18== II. Description of work performed during last quarter ==
     19
     20=== A. Activities and findings ===
     21Our first activity was addressing feedback from the GPO on the Asset Valuation and Risk Assessment report. Next, we worked for a couple weeks negotiating a new SOW.
     22
     23After we reworked the SOW in April, we quickly began the work on the threat and vulnerability report due at the end of May. This was focused mostly upon the major build-outs in Spiral 2 (OpenFlow and WiMAX). The first couple weeks were spent understanding those projects and activities in detail.
     24
     25After that, we developed a list of potential threat agents to GENI and highlighted those we determined most applicable to an organization like the GENI federation. For each of these threat agents we described their likely motivations and capabilities.
     26
     27Most of the work was then identifying specific threats and categorizing them. For each threat we identified the vulnerabilities that could be exploited to realize the threat, the types of threat agents that would likely perpetrate such a threat, the assets that such a threat would most directly affect and potential countermeasures that could be employed to deter or mitigate such threats. Lastly, we identified several threats that we will have to investigate in the future as we broaden the scope from just WiMAX and OpenFlow.
     28
     29Next we worked on two documents in parallel during the month of  June: The aggregate Provider Agreement and the Interim Operational Security Plan. Both required initial exploration of what other communities had done for these (e.g., Open Science Grid, TeraGrid, Planetlab & Emulab). The Operational Security Plan drew heavily from the plans from OSG, which is the federation we found most similar to GENI. Of course, it had to be adapted significantly for GENI, and it had to address the specific threats to GENI that we identified in the previous milestone.
     30
     31The aggregate provider agreement was more egalitarian. While a lot of the ideas came from these other communities, and discussions with people about the shortcomings of these agreements in other communities, it had to be changed dramatically for GENI.  Further, it drew as much from OSG as it did from Teragrid and Planetlab.
     32
     33=== B. Project participants ===
     34Adam Slagell
     35
     36=== C. Publications (individual and organizational) ===
     37The only related publications are the documents we created as the deliverables, specifically the Threat & Vulnerability Report for Milestone 4.
     38
     39=== D. Outreach activities ===
     40There have no been substantial out reach activities beyond those already within the GENI community.
     41
     42=== E. Collaborations ===
     43
     44Other collaborations were just conversations and phone calls with other GENI participants (e.g., Steve Schwabb and John-Paul Herron). These were mostly discussions about operational security, identity managment and the emergency stop procedures
     45
     46
     47=== F. Other Contributions ===
     48N/A